Nusair, 2023 - Google Patents
Smart Home Cybersecurity Challenges: An Assessment of End-User Knowledge and a Training Solution to Mitigate These ChallengesNusair, 2023
- Document ID
- 7675683577222904501
- Author
- Nusair A
- Publication year
External Links
Snippet
As the digital revolution unfolds, individuals are increasingly transforming their traditional homes into smart homes, adopting semi-and fully automated smart devices. This transformative shift, fueled by advancements in information technology, presents vast social …
- 238000012549 training 0 title abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Slupska et al. | Threat modeling intimate partner violence: Tech abuse as a cybersecurity challenge in the internet of things | |
Zeng et al. | End user security and privacy concerns with smart homes | |
Weichbroth et al. | Mobile security: Threats and best practices | |
Almutairi et al. | Investigation of smart home security and privacy: Consumer perception in saudi arabia | |
Heartfield et al. | Protection against semantic social engineering attacks | |
Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
Goh | Humans as the weakest link in maintaining cybersecurity: Building cyber resilience in humans | |
Corman | The Human Element in Cybersecurity–Bridging the Gap Between Technology and Human Behaviour | |
Kessler | Effectiveness of the protection motivation theory on small business employee security risk behavior | |
Wingreen et al. | Information Technology Security and Risk Management: Inductive Cases for Information Security | |
Maier et al. | Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps | |
Boye | Understanding cyberrisks in IoT: When smart things turn against you | |
Mitchell | Cyber Security@ home: The effect of home user perceptions of personal security performance on household IoT security intentions | |
Chhetri | Designing for Privacy in Smart Home Devices | |
Nusair | Smart Home Cybersecurity Challenges: An Assessment of End-User Knowledge and a Training Solution to Mitigate These Challenges | |
Lopes et al. | Common techniques, success attack factors and obstacles to social engineering: a systematic literature review | |
Wright | The use and acceptance of the Internet of Things (IoT) by American consumers | |
Raburn | Exploring why consumers do not use current cybersecurity mitigation strategies for IoT smart devices in the home | |
Nthala | Home data security decisions | |
Bhargava et al. | Beyond the Classroom: A Comprehensive Guide to Wearable Device Security in Education | |
Aiden et al. | Social Engineering Attacks: Detection and Prevention | |
Castleberry et al. | Attack Scenarios Relating to Army Facility-Related Control Systems: Quantifying the Cost to Secure and Cost Savings of the Army’s FRCS Program | |
Hassan et al. | Demonstration of cyber security through Penetration testing on IP camera | |
Shorts | Navigating the Maze: The Effectiveness of Manufacturer Support in Applying User-Controlled Security and Privacy Features | |
Williams | The socialization of secure computing practices for home internet users: A quantitative analysis of individual perceptions |